{"title":"多干扰器和窃听器存在下功率信标辅助D2D通信性能研究","authors":"T. N. Nguyen, P. Fazio, M. Voznák","doi":"10.55579/jaec.202154.341","DOIUrl":null,"url":null,"abstract":"In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. Moreover, to reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the multi-friendly jammers are employed to generate the artificial noises to E continuously. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model. Finally, the Monte-Carlo simulations are performed to corroborate the exactness of the mathematical analysis.This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.","PeriodicalId":250655,"journal":{"name":"J. Adv. Eng. Comput.","volume":"59 8","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Performance of Power Beacon-Assisted D2D Communications in the Presence of Multi-Jammers and Eavesdropper\",\"authors\":\"T. N. Nguyen, P. Fazio, M. Voznák\",\"doi\":\"10.55579/jaec.202154.341\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. Moreover, to reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the multi-friendly jammers are employed to generate the artificial noises to E continuously. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model. Finally, the Monte-Carlo simulations are performed to corroborate the exactness of the mathematical analysis.This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.\",\"PeriodicalId\":250655,\"journal\":{\"name\":\"J. Adv. Eng. Comput.\",\"volume\":\"59 8\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Adv. Eng. Comput.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55579/jaec.202154.341\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Adv. Eng. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55579/jaec.202154.341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the Performance of Power Beacon-Assisted D2D Communications in the Presence of Multi-Jammers and Eavesdropper
In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. Moreover, to reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the multi-friendly jammers are employed to generate the artificial noises to E continuously. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model. Finally, the Monte-Carlo simulations are performed to corroborate the exactness of the mathematical analysis.This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.